Chosen-Cipher Security of EPOC-2

نویسنده

  • Eiichiro Fujisaki
چکیده

At Eurocrypt’98, Okamoto and Uchiyama presented a new trapdoor (one-way) function based on factoring [5], while Fujisaki and Okamoto, at CRYPTO’99, showed a generic conversion from just oneway encryption to chosen-ciphertext secure encryption in the random oracle model [3]. We point out here that the result of combining both schemes, called EPOC-2, has a better efficiency in security reduction, more than would be expected from [3], that is, the chosen-cipher security of EPOC-2 is tightly reduced from factoring. 1 Chosen Ciphertext Security We recall the chosen-ciphertext security notion for asymmetric encryption following [4, 1]. In this security notion, we consider an adversary, A, that takes two stages, denoted find and guess. In the find stage, A takes publickey pk and returns two distinct messages, m0,m1, as well as string s (such as public information utilized in the next stage). A then takes in the guess stage the encryption of mb, denoted c∗ = Epk(mb), where b ∈ {0, 1} and the above information s. A then queries decryption oracle Dsk(·) with the only restriction that she can’t query the oracle on the challenge ciphertext c∗, and finally guesses b. The advantage of A is meant by how well she can guess value b. The random oracle version of this security notion is defined by allowing A to access a random oracle(s). We define by Ω a map family from an appropriate domain to an appropriate range. The domain and range depend on the target encryption scheme. Even if we choose two random functions with different domains or ranges, we just write, for convenience, the experiment as G,H ← Ω, instead of preparing two map families. We begin with some notations.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

EPOC: Efficient Probabilistic Public-Key Encryption (Submission to P1363a)

We describe a novel public-key cryptosystem, EPOC (Efficient Probabilistic Public-Key Encryption), which has two versions: EPOC-1 and EPOC-2. EPOC-1 is a public-key encryption system that uses a one-way trapdoor function and a random function (hash function). EPOC-2 is a public-key encryption system that uses a one-way trapdoor function, two random functions (hash functions) and a symmetric-key...

متن کامل

On the Security of EPOC and TSH-ESIGN

We submitted a public-key encryption scheme, EPOC, and digital signature scheme, TSH-ESIGN, to IEEE P1363a. The security of EPOC and TSH-ESIGN is based on the intractability of factoring n = pq, where p and q are primes. TSH-ESIGN is also based on the intractability of the approximate e-th root (AERP) assumption, which is the approximate version of the RSA assumption. This draft describes the l...

متن کامل

An evaluation of EPOC-2∗

EPOC-2 is an asymmetric (public-key) hybrid encryption scheme based on the asymmetric cryptosystem of Okamoto and Uchiyama, [13], and the hybrid encryption scheme of Fujisaki and Okamoto, [5]. In simple terms it generates a random key for use with a symmetric cipher and enciphers the message using that symmetric cipher. It then enciphers the key, along with a check value, using the Okamoto-Uchi...

متن کامل

Cipher text only attack on speech time scrambling systems using correction of audio spectrogram

Recently permutation multimedia ciphers were broken in a chosen-plaintext scenario. That attack models a very resourceful adversary which may not always be the case. To show insecurity of these ciphers, we present a cipher-text only attack on speech permutation ciphers. We show inherent redundancies of speech can pave the path for a successful cipher-text only attack. To that end, regularities ...

متن کامل

Total break of Zorro using linear and differential attacks

An AES-like lightweight block cipher, namely Zorro, was proposed in CHES 2013. While it has a 16-byte state, it uses only 4 S-Boxes per round. This weak nonlinearity was widely criticized, insofar as it has been directly exploited in all the attacks on Zorro reported by now, including the weak key, reduced round, and even full round attacks. In this paper, using some properties discovered by Wa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001